JDBC V2 Connector

JDBC V2 Connector

Connect to SSL-enabled databases for mappings in advanced mode

Connect to SSL-enabled databases for mappings in advanced mode

You can use JDBC V2 connection in mappings in advanced mode to connect to an SSL-enabled JDBC-complaint database. To run mappings in advanced mode with SSL-enabled JDBC-complaint databases, you need to download the SSL certificates to the Secure Agent machine, and then perform certain prerequisite tasks.
  1. Specify the JDBC URL in the JDBC V2 connection properties.
    To connect to an SSL-enabled Aurora PostgreSQL database, specify the following JDBC URL:
    jdbc:postgresql://<host>:<port>/dbname?sslmode=verify-ca&sslrootcert=<Location of the SSL certificate on the Secure Agent machine>
    , where the values for sslmode supports
    verify-ca
    and
    verify-ca
    .
    For example,
    jdbc:postgresql://aurorapostgres-appsdk.abc.ap-south-1.rds.amazonaws.com:5432/JDBC_V2?sslmode=verify-full&sslrootcert=/data/home/qamercury/cloud_td/Aurora_cert/rds-combined-ca-bundle.pem
    .
  2. After you specify the JDBC URL in the JDBC V2 connection properties, in the advanced session properties of the mapping task, select
    advanced.custom.property
    as the session property name.
  3. In the session property value, specify the following value:
    Spark.NeedUserCredentialFileForAdapter=true&:Spark.UserCredentialDirOnDIS=<Location of the SSL certificate on the Secure Agent machine>
    • Spark.NeedUserCredentialFileForAdapter. When you set this property to true, the Secure Agent copies the SSL certificate from the Secure Agent machine to the
      advanced cluster
      .
    • Spark.UserCredentialDirOnDIS. When you set this property to the location of the SSL certificates, the Secure Agent uses the specified location to get the SSL certificate.
      This property is optional. If you do not specify this property, the Secure Agent considers the following default location:
      /infa/user/credentials

0 COMMENTS

We’d like to hear from you!